Service oriented architecture plays a prominent role in creating and utilizing business services in enterprise computing environments. The service composers produce value by aggregating lower-level re-usable services, scattered across the internet to create application level services. Web service middleware facilitates in defining service compositions in a comprehensive manner. However, in order to ensure the business viability amidst unpredictably changing business requirements, such compositions may need to adapt during the runtime. Such changes might vary from a minor regulation to a major re-structuring of the IT service composition. However, the complexity of the composition shouldn't increase and the runtime interruptions to the service delivery need to be kept to a minimum. In this paper we introduce ROAD4WS, which is a middleware extension to the popular Apache Axis2 web service engine. The extension brings together the modular adaptive architecture of the Role Oriented Adaptive Design (ROAD) with the web services deployment and consumption capabilities of the Apache Axis2 engine, in order to facilitate deploying adaptive service compositions.
{"title":"ROAD4WS -- Extending Apache Axis2 for Adaptive Service Compositions","authors":"Malinda Kapuruge, A. Colman, Justin King","doi":"10.1109/EDOC.2011.15","DOIUrl":"https://doi.org/10.1109/EDOC.2011.15","url":null,"abstract":"Service oriented architecture plays a prominent role in creating and utilizing business services in enterprise computing environments. The service composers produce value by aggregating lower-level re-usable services, scattered across the internet to create application level services. Web service middleware facilitates in defining service compositions in a comprehensive manner. However, in order to ensure the business viability amidst unpredictably changing business requirements, such compositions may need to adapt during the runtime. Such changes might vary from a minor regulation to a major re-structuring of the IT service composition. However, the complexity of the composition shouldn't increase and the runtime interruptions to the service delivery need to be kept to a minimum. In this paper we introduce ROAD4WS, which is a middleware extension to the popular Apache Axis2 web service engine. The extension brings together the modular adaptive architecture of the Role Oriented Adaptive Design (ROAD) with the web services deployment and consumption capabilities of the Apache Axis2 engine, in order to facilitate deploying adaptive service compositions.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper gives a short overview of the IT Capability Maturity Framework (IT-CMF) and describes how it was used between 2007-2009 to help Intel IT navigate and track progress on IT capability improvement and value contribution from IT, whilst negotiating a strategic transition for the IT organization which involved significant downsizing and budget reduction. The case study illustrates how the IT-CMF was used to measure capability improvements, provide business intelligence information and prioritized improvement recommendations. The paper also discusses how practices contained within the IT-CMF helped articulate a business value improvement whilst more traditional metrics of IT performance indicated a degradation in performance.
{"title":"Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study","authors":"M. Curley, Jim Kenneally","doi":"10.1109/EDOC.2011.32","DOIUrl":"https://doi.org/10.1109/EDOC.2011.32","url":null,"abstract":"This paper gives a short overview of the IT Capability Maturity Framework (IT-CMF) and describes how it was used between 2007-2009 to help Intel IT navigate and track progress on IT capability improvement and value contribution from IT, whilst negotiating a strategic transition for the IT organization which involved significant downsizing and budget reduction. The case study illustrates how the IT-CMF was used to measure capability improvements, provide business intelligence information and prioritized improvement recommendations. The paper also discusses how practices contained within the IT-CMF helped articulate a business value improvement whilst more traditional metrics of IT performance indicated a degradation in performance.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This short survey describes recent and on-going work in the area of "business artifacts", an approach to business process modeling centered around a holistic combination of data and process. This includes research aiming to enable support for service interoperation that is much more flexible than current SOA-based approaches.
{"title":"Towards Flexible Service Interoperation Using Business Artifacts","authors":"R. Hull","doi":"10.1109/EDOC.2011.27","DOIUrl":"https://doi.org/10.1109/EDOC.2011.27","url":null,"abstract":"This short survey describes recent and on-going work in the area of \"business artifacts\", an approach to business process modeling centered around a holistic combination of data and process. This includes research aiming to enable support for service interoperation that is much more flexible than current SOA-based approaches.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sapkota, Camlon H. Asuncion, M. Iacob, M. V. Sinderen
In hybrid service composition approaches, processes are used to describe the core part of the composition logic whereas the rules are used to specify decision making constraints and conditions. These rules are exposed as services and are used in the processes whenever a certain decision has to be made. To evaluate these rules, we need a mechanism 1) to share data between the main process and the rule service, 2) to decide upon which service to invoke based on the result received from the rule service. In this paper, we propose a tuple space based solution for supporting these requirements. We also include descriptions of an application scenario to motivate our work, a prototype of the proposed solution and we demonstrate how our solution helps in achieving process flexibility with minimal maintenance costs in the context of changing requirements.
{"title":"A Simple Solution for Information Sharing in Hybrid Web Service Composition","authors":"B. Sapkota, Camlon H. Asuncion, M. Iacob, M. V. Sinderen","doi":"10.1109/EDOC.2011.16","DOIUrl":"https://doi.org/10.1109/EDOC.2011.16","url":null,"abstract":"In hybrid service composition approaches, processes are used to describe the core part of the composition logic whereas the rules are used to specify decision making constraints and conditions. These rules are exposed as services and are used in the processes whenever a certain decision has to be made. To evaluate these rules, we need a mechanism 1) to share data between the main process and the rule service, 2) to decide upon which service to invoke based on the result received from the rule service. In this paper, we propose a tuple space based solution for supporting these requirements. We also include descriptions of an application scenario to motivate our work, a prototype of the proposed solution and we demonstrate how our solution helps in achieving process flexibility with minimal maintenance costs in the context of changing requirements.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marwane El Kharbili, Qin Ma, Pierre Kelsen, E. Pulvermüller
Regulatory compliance management is now widely recognized as one of the main challenges still to be efficiently dealt with in information systems. In the discipline of business process management in particular, compliance is considered as an important driver of the efficiency, reliability and market value of companies. It consists of ensuring that enterprise systems behave according to some guidance provided in the form of regulations. This paper gives a definition of the research problem of regulatory compliance. We show why we expect a formal policy-based and model-driven approach to provide significant advantages in allowing enterprises to flexibly manage decision-making related to regulatory compliance. For this purpose, we contribute CoReL, a domain-specific modeling language for representing compliance requirements that has a graphical concrete syntax. Informal semantics of CoReL are introduced and its use is illustrated on an example. CoReL allows to leverage business process compliance modeling and checking, enhancing it with regard to, among other dimensions, user-friendliness, genericity, and traceability.
{"title":"CoReL: Policy-Based and Model-Driven Regulatory Compliance Management","authors":"Marwane El Kharbili, Qin Ma, Pierre Kelsen, E. Pulvermüller","doi":"10.1109/EDOC.2011.23","DOIUrl":"https://doi.org/10.1109/EDOC.2011.23","url":null,"abstract":"Regulatory compliance management is now widely recognized as one of the main challenges still to be efficiently dealt with in information systems. In the discipline of business process management in particular, compliance is considered as an important driver of the efficiency, reliability and market value of companies. It consists of ensuring that enterprise systems behave according to some guidance provided in the form of regulations. This paper gives a definition of the research problem of regulatory compliance. We show why we expect a formal policy-based and model-driven approach to provide significant advantages in allowing enterprises to flexibly manage decision-making related to regulatory compliance. For this purpose, we contribute CoReL, a domain-specific modeling language for representing compliance requirements that has a graphical concrete syntax. Informal semantics of CoReL are introduced and its use is illustrated on an example. CoReL allows to leverage business process compliance modeling and checking, enhancing it with regard to, among other dimensions, user-friendliness, genericity, and traceability.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mikko Uoti, K. Jansson, I. Karvonen, M. Ollus, S. Gusmeroli
Management of large scale distributed collaborative projects requires unified and aligned working methods and practices. Project alignment is the process to ensure that all key stakeholders share a common understanding of the project mission, goals, objectives, tactics, work processes and plans, and have the required competences and skills to perform in the project. Grounding on the recent advancements in the areas of collaborative networks, project management and Internet technologies, we have identified needs and opportunities for further development in the area of collaborative project management. We are presenting a methodology, model and a set of tools, called Project Alignment Booster, for promoting collaborative project management, introducing the concept of collaborative project alignment.
{"title":"Project Alignment: A Configurable Model and Tool for Managing Critical Shared Processes in Collaborative Projects","authors":"Mikko Uoti, K. Jansson, I. Karvonen, M. Ollus, S. Gusmeroli","doi":"10.1109/EDOC.2011.24","DOIUrl":"https://doi.org/10.1109/EDOC.2011.24","url":null,"abstract":"Management of large scale distributed collaborative projects requires unified and aligned working methods and practices. Project alignment is the process to ensure that all key stakeholders share a common understanding of the project mission, goals, objectives, tactics, work processes and plans, and have the required competences and skills to perform in the project. Grounding on the recent advancements in the areas of collaborative networks, project management and Internet technologies, we have identified needs and opportunities for further development in the area of collaborative project management. We are presenting a methodology, model and a set of tools, called Project Alignment Booster, for promoting collaborative project management, introducing the concept of collaborative project alignment.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132321036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is a compelling need for highly customized Domain Specific Languages and Business Vocabulary in certain industries such as insurance, mortgage, and finance to enable Knowledge Workers to articulate and to automate complex rules pertinent to their areas of function within their companies. Rule Engine vendors attempt to provide a solution to the problem by selling an integrated Rules Engine and Business Rules Management System. Usually, the BRMS's provided by vendors need to be customized and integrated into the overall Enterprise Architecture. This results in the Enterprise Architecture to be tightly coupled with the vendor's rule offering. Moreover, it poses a significant risk to the Enterprise as vendor solutions change between releases. The Enterprise Architecture needs a way to insulate itself from such impacts. This paper describes a framework that delivers the core BRMS functions of authoring and representation in a vendor neutral fashion. In addition, the paper sheds light on specific areas of the framework that can be standardized.
{"title":"An Engine-Independent Framework for Business Rules Development","authors":"Mukundan K. Agaram, Chang Liu","doi":"10.1109/EDOC.2011.20","DOIUrl":"https://doi.org/10.1109/EDOC.2011.20","url":null,"abstract":"There is a compelling need for highly customized Domain Specific Languages and Business Vocabulary in certain industries such as insurance, mortgage, and finance to enable Knowledge Workers to articulate and to automate complex rules pertinent to their areas of function within their companies. Rule Engine vendors attempt to provide a solution to the problem by selling an integrated Rules Engine and Business Rules Management System. Usually, the BRMS's provided by vendors need to be customized and integrated into the overall Enterprise Architecture. This results in the Enterprise Architecture to be tightly coupled with the vendor's rule offering. Moreover, it poses a significant risk to the Enterprise as vendor solutions change between releases. The Enterprise Architecture needs a way to insulate itself from such impacts. This paper describes a framework that delivers the core BRMS functions of authoring and representation in a vendor neutral fashion. In addition, the paper sheds light on specific areas of the framework that can be standardized.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123897255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A business web is a collection of enterprises designed to jointly satisfy a consumer need. A model that shows the creation, distribution, and consumption of goods or services of economic value in a business web is called value model. The goal of a value model is to help the stakeholders build a shared understanding of the business case and assess the potential profitability of collaboration in the business web. The participating stakeholders in a business web are assumed to act trustfully in the collaboration and therefore trust is left entirely outside the picture. However the assumption that stakeholders act trustfully is often not useful in practice (since there are malicious actors). In this paper we consider business webs from a trust perspective and introduce an approach for measuring the trustworthiness of the stakeholders participating in a business web.
{"title":"Trust and Business Webs","authors":"H. Fatemi, M. V. Sinderen, R. Wieringa","doi":"10.1109/EDOC.2011.18","DOIUrl":"https://doi.org/10.1109/EDOC.2011.18","url":null,"abstract":"A business web is a collection of enterprises designed to jointly satisfy a consumer need. A model that shows the creation, distribution, and consumption of goods or services of economic value in a business web is called value model. The goal of a value model is to help the stakeholders build a shared understanding of the business case and assess the potential profitability of collaboration in the business web. The participating stakeholders in a business web are assumed to act trustfully in the collaboration and therefore trust is left entirely outside the picture. However the assumption that stakeholders act trustfully is often not useful in practice (since there are malicious actors). In this paper we consider business webs from a trust perspective and introduce an approach for measuring the trustworthiness of the stakeholders participating in a business web.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116639237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos L. B. Azevedo, J. P. Almeida, M. V. Sinderen, D. Quartel, G. Guizzardi
The "motivation domain" of an Enterprise Architecture addresses objectives in a broad scope ranging from high-level statements expressing the goals of an enterprise to declarations of requirements on business processes, services and systems. An important development regarding the incorporation of the motivation domain in a comprehensive Enterprise Architecture modeling language is the upcoming Motivational Extension to ArchiMate (based on the ARMOR language). The extension proposes the inclusion of concepts such as concerns, assessments, goals, principles and requirements to ArchiMate. We believe that careful definition of the semantics of these concepts is required, especially when considering that the motivation domain addresses subjective aspects of the enterprise. To address that, this paper focuses on an ontology-based semantics for the Motivation Extension. We interpret the concepts by using the Unified Foundational Ontology (UFO) as a semantic domain, and, as a result, propose well-founded recommendations for improvements of the extension.
{"title":"An Ontology-Based Semantics for the Motivation Extension to ArchiMate","authors":"Carlos L. B. Azevedo, J. P. Almeida, M. V. Sinderen, D. Quartel, G. Guizzardi","doi":"10.1109/EDOC.2011.29","DOIUrl":"https://doi.org/10.1109/EDOC.2011.29","url":null,"abstract":"The \"motivation domain\" of an Enterprise Architecture addresses objectives in a broad scope ranging from high-level statements expressing the goals of an enterprise to declarations of requirements on business processes, services and systems. An important development regarding the incorporation of the motivation domain in a comprehensive Enterprise Architecture modeling language is the upcoming Motivational Extension to ArchiMate (based on the ARMOR language). The extension proposes the inclusion of concepts such as concerns, assessments, goals, principles and requirements to ArchiMate. We believe that careful definition of the semantics of these concepts is required, especially when considering that the motivation domain addresses subjective aspects of the enterprise. To address that, this paper focuses on an ontology-based semantics for the Motivation Extension. We interpret the concepts by using the Unified Foundational Ontology (UFO) as a semantic domain, and, as a result, propose well-founded recommendations for improvements of the extension.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we describe the feasibility and practical study of the recently proposed idea for data leak prevention (DLP) based on end-point policy enforcement. The most reassuring way to prevent sensitive data leak is to thwart sensitive data export before it has a chance to occur. Using a System Call Interception (SCI) technique we investigate the possibility of automatically detecting and amending a non-desired, policy breaching behavior at the "intention" stage: as the corresponding system call is called by an application, but before the action has been accomplished. The SCI method is especially valuable for "black box" applications, for which source code is not available. In our system, we catalog the system calls involved in the DLP events, and reduce our SCI to the minimum necessary set of system calls associated with the sensitive, DLP-requiring tasks. We describe the system behavior for several different applications that we have studied to date.
{"title":"System Call Interception Framework for Data Leak Prevention","authors":"H. Balinsky, D. Perez, S. Simske","doi":"10.1109/EDOC.2011.19","DOIUrl":"https://doi.org/10.1109/EDOC.2011.19","url":null,"abstract":"In this paper, we describe the feasibility and practical study of the recently proposed idea for data leak prevention (DLP) based on end-point policy enforcement. The most reassuring way to prevent sensitive data leak is to thwart sensitive data export before it has a chance to occur. Using a System Call Interception (SCI) technique we investigate the possibility of automatically detecting and amending a non-desired, policy breaching behavior at the \"intention\" stage: as the corresponding system call is called by an application, but before the action has been accomplished. The SCI method is especially valuable for \"black box\" applications, for which source code is not available. In our system, we catalog the system calls involved in the DLP events, and reduce our SCI to the minimum necessary set of system calls associated with the sensitive, DLP-requiring tasks. We describe the system behavior for several different applications that we have studied to date.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"694 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115116350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}